Semantic search

Jump to navigation Jump to search
Condition
Printout selection
Options
Parameters [
limit:

The maximum number of results to return
offset:

The offset of the first result
link:

Show values as links
headers:

Display the headers/property names
mainlabel:

The label to give to the main page name
intro:

The text to display before the query results, if there are any
outro:

The text to display after the query results, if there are any
searchlabel:

Text for continuing the search
default:

The text to display if there are no query results
class:

An additional CSS class to set for the table
transpose:

Display table headers vertically and results horizontally
sep:

The separator between results
Sort options
Delete
Add sorting condition
 AuthorEditorBotnet
Detecting extended attributes (ZeroAccess) and other Frankenstein’s monsters with HMFTHexacornZeroAccess
Discovered: botnet costing display advertisers over six million dollars per monthSpider.ioChameleon
File infector Expiro hits US, steals FTP credentialsRhena InocencioTrend MicroExpiro
First widespread virus cross-infectionJeet MorpariaSymantecExpiro
Five charged in largest hacking scheme ever prosecuted in USRyan NaraineSecurityWeek
Going solo: self-propagating ZBOT malware spottedAbigail Pichel
Joie Salvio
Alvin Bacani
Trend MicroZeuS
Got malware? Rent an exploit serviceKevin StevensDamballa
Hello Neutrino ! (just one more Exploit Kit)KafeineKafeine
Hesperbot – A new, advanced banking trojan in the wildRobert Lipovsky
Anton Cherepanov
ESETHesperbot
Hiding in plain sight: the FAKEM remote access trojanNart VilleneuveTrend MicroFakeM
Infamous Skynet botnet author allegedly arrestedMalwareTechMalwareTechSkynet
Inside the world of the Citadel trojanRyan SherstobitoffMcAfeeCitadel
Internet Census 2012, port scanning /0 using insecure embedded devicesCarna BotnetCarna
Kelihos botnet appears again with new variantJay PfoutzSecure ConnexionKelihos
Kelihos is dead… No wait… Long live Kelihos! Again!Phil HayTrustwaveKelihos
Kore exploit kitDarrylKahu Security
Latest Kelihos botnet shut down live at RSA Conference 2013Michael MimosoKaspersky labKelihos
Lifting the lid on the Redkit exploit kit (Part 1)Fraser HowardSophos Labs
Linux/Cdorked.A: New Apache backdoor being used in the wild to serve BlackholePierre-Marc BureauESET
Look what I found: it's a Pony!Anat DavidiTrustwavePony
MDK: the largest mobile botnet in ChinaFlora LiuSymantecMDK
Bmaster
Mac spyware found at Oslo Freedom ForumSean SullivanF-SecureHangOver
Malware evolving to defeat anti-DDoS services like CloudFlare?Alexis Dorais-JoncasESETOutFlare
Mariposa botnet 'mastermind' jailed in SloveniaBBCMariposa
Massive search fraud botnet seized by Microsoft and SymantecSean GallagherCondé NastBamital
Mastermind behind Gozi bank malware charged along with two othersKim ZetterCondé NastGozi
Measuring and detecting malware downloads in live network trafficManos Antonakakis
Babak Rahbarinia
Roberto Perdisci
Kang Li
Phani Vadrevu
ESORICS
Meet "Red Dot exploit toolkit"KafeineMalware don't need cofee
Microsoft and Symantec take down Bamital botnet that hijacks online searchesRichard BoscovichMicrosoftBamital
MinidukeCrySyS LabMiniDuke
Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communicationAleksandr MatrosovESETAvatar
NASK shuts down dangerous Virut botnet domainsCERT PolskaVirut
NetTraveler is back: the 'Red Star' APT returns with new tricksCostin RaiuKaspersky labNetTraveler
New CryptoLocker spreads via removable drivesAbigail PichelTrend MicroCryptoLocker
New Mac malware discovered on attendee computer at anti-surveillance workshopBrian DonohueKaspersky labHangOver
New crimeware attacks LatAm bank usersJorge MieresKaspersky labPiceBOT
VOlk
S.A.P.Z.
Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilitiesDancho DanchevWebroot
Nymaim - obfuscation chroniclesJean-Ian BoutinESETNymaim
OSX Kitmos analysisSteeve BarbeauSteeve BarbeauHangOver
PeerRush: mining for unwanted P2P trafficBabak Rahbarinia
Roberto Perdisci
Andrea Lanzi
Kang Li
Conference on Detection of Intrusions and Malware & Vulnerability Assessment
PokerAgent botnet stealing over 16,000 Facebook credentialsRobert LipovskyESETPokerAgent
Qadars: un nouveau malware bancaire avec un composant mobileDaniel LunghiLEXSIQadars
Reversing Andromeda-Gamarue botnetRashid BhattGarage 4 HackersAndromeda
SPL exploit kit – now with CVE-2013-0422Denis Laskov
Secrets of the Comfoo mastersJoe Stewart
Don Jackson
DELL SecureWorksComfoo
Stealing money from ATMs with malwareAnonymousCCC 30C3
Stealthy peer-to-peer C&C over SMB pipesRaphael MudgeStrategic Cyber LLCDuqu
Survey on network-based botnet detection methodsSebastián García
Alejandro Zunino
Marcelo Campo
John Wiley & Sons, Ltd.
Takeover of Virut domainsCERT PolskaVirut
Targeted information stealing attacks in South Asia use email, signed binariesJean-Ian BoutinESETHangOver